I just gave the new patch a shot and I'm still experiencing a problem 
I've been seeing for some time. I get a segmentation fault in 
isight_load_firmware but for what reason I'm unsure. I'm attaching the 
dump I find in dmesg. I'd much appreciate any help anyone can give me. 
Firmware is where it should be. I've tried with both the version from my 
OSX drive and the version in the all-in-one bundle with the same results.

Sean Burke

BUG: unable to handle kernel NULL pointer dereference at virtual address 
00000002
printing eip:
f8bddbba
*pde = 00000000
Oops: 0000 [#1]
PREEMPT SMP
Modules linked in: cryptomgr crypto_algapi uvcvideo snd_pcm_oss 
snd_mixer_oss snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device 
hci_usb wlan_scan_sta ath_rate_sample(F) ath_pci(F) wlan ath_hal(P) sky2 
usbhid appletouch evdev snd_hda_intel snd_pcm snd_timer snd soundcore 
snd_page_alloc
CPU:    0
EIP:    0060:[<f8bddbba>]    Tainted: PF       VLI
EFLAGS: 00210282   (2.6.23-gentoo-r3-mactel #1)
EIP is at isight_load_firmware+0x1ba/0x570 [uvcvideo]
eax: eaecbcdc   ebx: f7f79200   ecx: c189f4c0   edx: fffffffe
esi: eaecbcdc   edi: eaecbccc   ebp: f78c4400   esp: eaecbc7c
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process modprobe (pid: 6837, ti=eaeca000 task=f78b3550 task.ti=eaeca000)
Stack: 00000001 c1563ba0 c015535c 00000002 00000044 eb1dc000 eaecbcb8 
ea820000
      00012ab0 c04bcb00 c04bca40 00000002 00000000 c17d3a14 c04bd150 
00000000
      00000000 00000000 00000000 00000000 c1550400 00000000 c012165f 
00012ab0
Call Trace:
[<c015535c>] get_page_from_freelist+0x2ac/0x3a0
[<c012165f>] enqueue_entity+0xbf/0x230
[<f8bd6dbb>] uvc_delete+0x24b/0x1e50 [uvcvideo]
[<c0125c79>] check_preempt_curr_fair+0x59/0x90
[<c0274caa>] idr_get_empty_slot+0xea/0x270
[<c0274eb7>] ida_get_new_above+0x87/0x180
[<c0182e5e>] find_inode+0x3e/0x70
[<c01ac290>] sysfs_ilookup_test+0x0/0x10
[<c0182fa6>] ifind+0x46/0xa0
[<c0182c75>] iput+0x35/0x70
[<c01ac8c4>] sysfs_addrm_finish+0x34/0x200
[<c01adb36>] sysfs_create_link+0x96/0x170
[<c0339517>] usb_match_one_id+0x27/0xc0
[<c033a3a5>] usb_probe_interface+0x75/0xd0
[<c02e82ce>] driver_probe_device+0x8e/0x190
[<c03eb97d>] klist_next+0x5d/0xa0
[<c02e8510>] __driver_attach+0x80/0x90
[<c02e768a>] bus_for_each_dev+0x3a/0x60
[<c02e8136>] driver_attach+0x16/0x20
[<c02e8490>] __driver_attach+0x0/0x90
[<c02e7a6b>] bus_add_driver+0x8b/0x1b0
[<c033a330>] usb_probe_interface+0x0/0xd0
[<c0339e25>] usb_register_driver+0x95/0x110
[<f8a4106f>] init_module+0x6f/0x86 [uvcvideo]
[<c014858f>] sys_init_module+0x15f/0x18d0
[<c01554a7>] __alloc_pages+0x57/0x2f0
[<f8bc5000>] crypto_remove_final+0x0/0x50 [crypto_algapi]
[<c028f55d>] tty_write+0x1bd/0x1d0
[<c010431e>] sysenter_past_esp+0x5f/0x85
=======================
Code: 8b 44 24 20 89 44 24 5c b8 6f 01 be f8 e8 3f a6 68 c7 89 c2 89 44 
24 60 85 d2 b8 00 02 00 00 89 44 24 64 74 30 8d 74 24 60 89 f0 <ff> 52 
04 89 f0 8b 5c 24 60 8d 54 24 50 8b 4c 24 20 ff 53 08 89
EIP: [<f8bddbba>] isight_load_firmware+0x1ba/0x570 [uvcvideo] SS:ESP 
0068:eaecbc7c
_______________________________________________
Linux-uvc-devel mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/linux-uvc-devel

Reply via email to